Lecture 7 Flashcards

Malicious code (35 cards)

1
Q

A threat that exploits various vulnerability to spread malicious payloads is called what?

A

Malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

People who are extremely skilled software developers and develop maliciuos code are called what?

A. Skilled malicious code programmers
B. Script kiddies

A

A. Skilled malicious code programmers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A person that uses existing and well known techniques and programs or scripts are called what?

A. Skilled malicious code programmers
B. Script kiddies

A

B. Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Macro virus uses what?

A

script functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This virus is stored is stored in the MBR and another location in the system.

A

master boot record (MBR) virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This virus type infects executable files and triggers when the OS tries to execute them.

A

File infector virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are there fewer UNIX viruses?

A

they are developed on entirely different kernels make it difficult to write a virus that would impact a large number of UNIX systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Signature based antivirus works how?

A

Use a database of known signatures to find a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A virus that uses more than 1 propagation technique is called what?

A. Stealth
B. Multipart
C. Hidden
D. Rootkit

A

B. Multipart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of virus hides by tampering with the OS?

A. Stealth
B. Multipart
C. Hidden
D. Polymorphic

A

A. Stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This virus modifies its code as it moves from system to system.

A. Stealth
B. Multipart
C. Polymorphic
D. Rootkit

A

C. Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This virus encrypts their code with different cryptographic keys to avoid detection.

A. Stealth
B. Encrypted
C. Polymorphic
D. Rootkit

A

B. Encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a logic bomb virus?

A

It lies dormant until a specific trigger is met..Can be time or a particular action being performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What time of virus looks benign but is really malicious?

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a worm?

A

Malicious code that can self propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The code red worm did 3 things. What were they?

A

Look for vulnerable versions of IIS
Defaced html pages on the local web server
planted a logic bomb

17
Q

This worm searched for a Siemans controller to disrupt nuclear facilities by destroying the centrifuge.

18
Q

This type of malicious code monitors your actions and collects information and transmits it back to a remote system.

19
Q

What are the three key places to implement countermeasures of malicious code?

A

Clients
Servers
Content filters (ex: email)

20
Q

This type of DDos compromised third party systems to install a program and lies dormant waiting for instruction.

A. Syn Flood
B. Trinoo and Tribe Flood Network
C. Smurf
D. Teardrop

A

B. Trinoo and Tribe Flood Network

21
Q

This attack uses one or more third party newtorks to conduct an attack.

A. Syn Flood
B. Trinoo and Tribe Flood Network
C. Smurf
D. Teardrop

A

C. Smurf (distributed reflective denial-of-service attack) (DRDos)

22
Q

A DNS amplification attack is used to what?

A

Send a large volume of unwanted traffic to a third party.

23
Q

this type of attack is where a fragmented packet is sent that does not conform to the fragmentation protocol specification. The system doesn’t know how to handle this and can crash.

24
Q

This type of attack occurs when an artificial TCP segmnt has the SYN flag set and the source and destination IP are set to the victim machine.

25
An attack where a ping packet is sent with a size over the alloted size (65,536).
Ping of Death
26
When a developer does not properly program input validation this attack can occur.
buffer overflow
27
When a program checks the access permission too far in advance of a resource use this issue can occur. A. buffer overflow B. Land attack C. TOC/TOU D. teardrop
C. TOC/TOU
28
An undocumted access mechanism to bypass normal access restrictions. Developers may use them.
trapdoor/backdoor
29
These are used to allow attackers to gain expanded access to a system.
Rootkit
30
this type of attack on web applications injects client-side scripts into webpages. A. SQL injection B. Cross-site Scripting (XSS)
B. Cross-site Scripting (XSS)
31
This occurs when an attacker inserts their own SQL code into the input field to affect the underlying database. A. SQL injection B. Cross-site Scripting (XSS)
A. SQL injection
32
A reconnaissance attack that tries to gather IP information about an organization. Can use ping sweep. A. Port Scan B. Vulnerability scan C. Ip Probe D. Dumpster Diving
C. Ip Probe
33
Performing a scan to find open or used ports in an environment. A. Port Scan B. Vulnerability scan C. Ip Probe D. Dumpster Diving
A. Port Scan
34
A tool to find specific vulnerabilities on a potential target system. A. Port Scan B. Vulnerability scan C. Ip Probe D. Dumpster Diving
B. Vulnerability scan
35
This attack analyzes waste to gain intelligence that might help launch an attack. A. Port Scan B. Vulnerability scan C. Ip Probe D. Dumpster Diving
D. Dumpster Diving